Andrea Fortuna
AboutRss
  • Jun 13, 2016

    Windows 10 upgrade chronicles: the aggressive push by Microsoft, explained with a comic

    From arstechnica.com: […] Microsoft has become progressively more aggressive. In the early days, this upgrade was found to be downloading the new operating system even before users opted in, and it was then accused of installing automatically. Perfectly explained in… read more »
  • Jun 13, 2016

    Dropbox’s Project Infinite needs kernel access: could be a security problem?

    On the surface, Dropbox’s Project Infinite sounds great, but there are security risks? From Dropbox Tech Blog: Project Infinite is designed to enable you to access all of the content in your Dropbox — no matter how small the hard disk on your… read more »
  • Jun 10, 2016

    Chrome Net-Internals: little known but very useful

    Chrome has a lot of functionality, for both end users and developers. One of this i little known but very usefull: the net-internals application, which is accessible by typing chrome://net-internals into your Chrome browser. What is net-internals? From Chromium Project… read more »
  • Jun 9, 2016

    Another day, another leak: 32 millions Twitter accounts may have being sold on the dark web

    The website LeakedSource has gathered a database of Twitter usernames and passwords that are on sale on the dark web. LeakedSource noted in a blog post that the database contains 32,888,300 accounts: the passwords were stored as plain text and several… read more »
  • Jun 9, 2016

    Need a playlist of music suited to yoga and meditation? Moby has a gift for you!

    “Long ambients1: calm. sleep.” — 11 instrumental tracks, perfect for meditation and yoga sessions Moby, a yoga enthusiast, has shared a playlist designed for yoga and meditation, free downloadable on his website: over the last couple of years i’ve been making really really… read more »
  • Jun 9, 2016

    Start Tor Browser with another instance of Firefox opened

    A short tip to open 2 instances of Firefox (one on ‘clean web’, one on the ‘hidden web’) Sometimes it may become necessary to keep open both Firefox and Tor Browser. And in that case usually appear this message: The solution… read more »
  • Jun 8, 2016

    Java tips: how to fix the “InvalidKeyException: Illegal key size or default parameters” runtime…

    How to remove the key size restriction in Java JDK? Are you developing your beautiful application using the Java Cryptography Extension, and using a key length of more than 128 bits you encounter the following error? Caused by: java.security.InvalidKeyException: Illegal key… read more »
  • Jun 6, 2016

    Game of Thrones season 6, episode 7: Beware The Hound!

    Sandor “The Hound” Clegane, whom we last saw back in season four, was badly injured in a brutal fight with Brienne, and Arya apparently left him to die alone. But Sandor aren’t easy to kill, and reappears in this episode: the… read more »
  • Jun 6, 2016

    peace_of_mind is back: now sell 100 millions VK.com’s account with cleartext passwords!

    Another day, another data breach! peace_of_mind, the same hacker who previously sold data dumps from LinkedIn is now selling more than 100 Million VK.com accounts. VK.com is the Russia’s biggest social networking site, it’s based in St. Petersburg and has at… read more »
  • Jun 5, 2016

    TeamViewer has been hacked? Some suggested readings

    What really happened to TeamViewer? According TeamViewer there is no breach, the only problem is located between the chair and the keyboard. https://imgur.com/eHPpzEL Let’s take a look at what they say the most known blogs about technology and security: [embed]https://www.teamviewer.com/en/company/press/statement-on-service-outage/[/embed]… read more »
  • Jun 4, 2016

    Linux vs. Windows: killing a process

    http://ctp200.com/comic/13 … read more »
  • Jun 3, 2016

    Ransomware: preventions and mitigation

    Some tips to prevent and mitigate ransomware infections How prevent the infection? http://www.humor.ezgeta.com/ Do as often as possible a backup of all the important data and hold it offline and away from the local network when not in use. Avoid… read more »
  • Jun 2, 2016

    Turn your Raspberry Pi into a War Machine with WarBerryPi

    A collection of scanning tools to obtain as much information as possible in a short period of time with being as stealth as possible The WarBerry was built with one goal in mind: to be used in red teaming engagement where… read more »
  • Jun 1, 2016

    Android malware evolve to handle Marshmallow’s new permission model

    Android malware have adapted their attack models to target the permission-granting model that Google has introduced in Android 6.0 Marshmallow Dinesh Venkatesan, Threat Analysis Engineer at Symantec, explains in this blog post that the authors of Android Trojans have adapted… read more »
  • Jun 1, 2016

    More than 100mln dropbox accounts leaked?

    The leak is probably related to the 2014 breach On the 18th May 2016 Twitter account @w0rm has posted a link that expose 100 million Dropbox account credentials in a zipped file. https://twitter.com/wormws/status/732914034983501825 This file has been assessed as holding 4.9GB… read more »
  • May 31, 2016

    BBC Horizon: Inside the Dark Web

    Twenty-five years after the world wide web was created, it is now caught in the greatest controversy of its existence : surveillance With many concerned that governments and corporations can monitor our every move, Horizon meets the hackers and scientists whose… read more »
  • May 31, 2016

    Appie: Android Pentesting Portable Integrated Environment

    A useful windows software for Android Pentesting Aditya Agarwal is a Information Security Professional that has realized an interesting package for penetration testing and forensic purposes on android apps: Appie is a software package that has been pre-configured to function… read more »
  • May 31, 2016

    Pär Österberg Medina: Detecting Rootkits in Memory Dumps

    A precious presentation by Pär Österberg Medina about dumping and analyzing a memory dump for detecting rootkits, discovered in the twitter feed of Binni Shah: [embed]https://twitter.com/binitamshah/status/731774589001334785[/embed] Covered topics What is a rootkit? Dumping the memory How-to analyze a memory dump?… read more »
  • May 30, 2016

    FLOSS: FireEye Labs Obfuscated String Solver — Automatically extract obfuscated strings from…

    Malware authors pack their software to resist reverse engineering and enable their operations to survive longer. However, many features of packing are easy to automatically identify during static or dynamic analysis. Therefore, some authors obfuscate only the most sensitive resources… read more »
  • May 29, 2016

    Antonio Lauro, “Valse Venezolano no. 2”

    My comments about the piece, and an example of how NOT playing it! The author Antonio Lauro (August 3, 1917 — April 18, 1986) was the son of an Italian immigrant who was an amateur singer and guitarist. His musical lessons began with… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician